Metrics
Affected Vendors & Products
Mon, 18 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 18 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langgenius
Langgenius dify |
|
| Vendors & Products |
Langgenius
Langgenius dify |
Mon, 18 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dify version 1.14.1 and prior contain a path traversal vulnerability that allows authenticated users to manipulate requests forwarded to the Plugin Daemon's internal REST API by exploiting insufficient URL path sanitization. Attackers can traverse out of their authorized tenant path using unencoded dot sequences in task identifiers or manipulated filename parameters to access internal endpoints such as debug interfaces, requiring only knowledge of the victim tenant's UUID. NOTE: Dify Cloud allows unauthenticated free self-registration, making account creation trivially accessible to any attacker. | |
| Title | Dify v1.14.1 Path Traversal via Plugin Daemon Internal API Access | |
| Weaknesses | CWE-23 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-18T14:38:57.057Z
Reserved: 2026-04-22T18:50:43.622Z
Link: CVE-2026-41948
Updated: 2026-05-18T14:38:50.530Z
Status : Undergoing Analysis
Published: 2026-05-18T15:16:25.977
Modified: 2026-05-18T17:29:01.030
Link: CVE-2026-41948
No data.
OpenCVE Enrichment
Updated: 2026-05-18T16:00:15Z